Re: hidden files



Jim Watt wrote:

On Fri, 21 Apr 2006 23:18:57 +0200 (CEST), George Orwell
<nobody@xxxxxxxxxxxx> wrote:

I'm sorry, did someone else post to a public discussion forum under your
name?

The purpose of the posting was to have a sensible discussion of the topic
with intelligent people.

Then why don't you try actually DISCUSSING the topic with your superiors?

Maybe having intelligent ideas expressed too close together confuses you?
Let's try a more ordered approach....

If an attacker "owned" Amazon's shopping cart, why would they need or
want to attempt phishing for information they already have?

If an attacker "owned" your machine, why would they need or want to
attempt phishing for information they already have, or could easily get?

Why would an attacker expose themselves so blatantly by phishing customers
in sync with purchases?

Here's another one you can pout over, then impress everyone by ignoring....

Why would someone who claims to be some sort of "professional" miss the
most obvious answer, that your foil beanie theories of you or them being
owned held no water because if there was a targeted attack of the type
you describe at all, it would most likely come from someone who only saw
the connection, but not the data? Except how would they get your email
address from sniffing and encrypted connection?

Concentrate really hard, there's no time limit.

You may find this link helpful

http://www.amazon.com/gp/product/6305882649

Begs the question of whether or not you received another phishing email
after attempting to buy a clue. <laughing>

.